UDP-OR: A Fair Onion Transport Design

Low latency anonymity systems face many challenges. One of them is how to fairly allocate network resources among many unknown users and applications. This paper presents a design for a end-to-end inspired transport mechanism for onion routers. The design uses the same solutions and implementations that had made the Internet scale. We compare an implementation of the design with Tor’s (the third generation onion router) 1 and show initial benefits of the design.

[1]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[2]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[3]  QUTdN QeO,et al.  Random early detection gateways for congestion avoidance , 1993, TNET.

[4]  L. Peterson,et al.  TCP Vegas: new techniques for congestion detection and avoidance , 1994, SIGCOMM.

[5]  Gene Tsudik,et al.  Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[6]  W. Richard Stevens,et al.  TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms , 1997, RFC.

[7]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[8]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[9]  Sally Floyd,et al.  Promoting the use of end-to-end congestion control in the Internet , 1999, TNET.

[10]  Robert Tappan Morris,et al.  Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.

[11]  Brian Neil Levine,et al.  Hordes: a Multicast-Based Protocol for Anonymity , 2002, J. Comput. Secur..

[12]  Bernhard Plattner,et al.  Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.

[13]  George Danezis,et al.  Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..

[14]  Emin Gün Sirer,et al.  Herbivore: A Scalable and Efficient Protocol for Anonymous Communication , 2003 .

[15]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[16]  Eric Rescorla,et al.  The Design and Implementation of Datagram TLS , 2004, NDSS.

[17]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[18]  Bernhard Plattner,et al.  Practical Anonymity for the Masses with MorphMix , 2004, Financial Cryptography.

[19]  Riccardo Bettati,et al.  SAS: A Scalar Anonymous Communication System , 2005, ICCNMC.

[20]  George Danezis,et al.  Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[21]  Aravind Srinivasan,et al.  P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[22]  Nick Mathewson,et al.  Challenges in deploying low-latency anonymity , 2005 .

[23]  Kevin S. Bauer,et al.  Low-Resource Routing Attacks Against Anonymous Systems , 2007 .

[24]  Sally Floyd,et al.  Router Mechanisms to Support End-to-End Congestion Control , 2007 .

[25]  Steven J. Murdoch,et al.  Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.

[26]  Nicholas Hopper,et al.  Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes , 2008, Financial Cryptography.

[27]  Zach Brown Cebolla: Pragmatic IP Anonymity , 2010 .